Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    28-04-2024 04:50

General

  • Target

    046919029770f1e6f8df03e428865948_JaffaCakes118.exe

  • Size

    25.5MB

  • MD5

    046919029770f1e6f8df03e428865948

  • SHA1

    5038379ea2462fb7b9d2ac1712cf2b17d9b266b5

  • SHA256

    b3ff713108a89d70c2202fb9d3f43c31e1821930a5fd1f07b36887ff5aa18dca

  • SHA512

    d12e7987017196cdd88b654a1c59acd3c51c72356d147a33393711f6e7366c0fce685bd558272ac8d93b2cbe9bd483a308127fa3ac90cc0eeb10f66cadb6d749

  • SSDEEP

    49152:XYgph7GBfWihDkYOMwwnMb4PmyVtHDkYOMwwnMb4PmyVGs:XX77GBfWLYOXwnS4rVtYYOXwnS4rVGs

Malware Config

Signatures

  • Nirsoft 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\046919029770f1e6f8df03e428865948_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\046919029770f1e6f8df03e428865948_JaffaCakes118.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Program Files\Internet Explorer\IEXPLORE.exe
      "C:\Program Files\Internet Explorer\IEXPLORE" 212.33.237.86/images/1/report.php
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2320
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2320 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ose.exe
    Filesize

    25.7MB

    MD5

    ee74883a42ee6661a7a3c981fa561664

    SHA1

    9746d9249823f80ffe9cf855e376015be9a19037

    SHA256

    aa68fe10a062f9660b675a0aaa22cda8578a6d9a45693c6b7027fc0246ce02da

    SHA512

    46a8c5613c7f6752a19c97d7e187d9531d7e59251f1f22b851eaf12e2127b1371909babb77cbc629b00e53a6509c26adb23f47e81f99bc2518aabec33a8ee8dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c2a11568dcf627ebaeaea6bb2310d4fd

    SHA1

    3037d895fef6c7d9d6819a510f1c909ec5fa2ad9

    SHA256

    bfb8d0b312120c1154b6fe3124ea772f2b0087f0dd97fe612c8dd4adaf60eeee

    SHA512

    f901a69b0596d840aff01bcb096ad1cfbc10359f5325cb6ee2a05d8673eec741452b94e431f32995ff3b170d03b71c1f03c4fcecba95e13043b133b023cb75cb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    9998c1f82b7e12cf141240eb6d42957c

    SHA1

    87d9816fc9e4576c4eb8e2ee36baea617b61289d

    SHA256

    80a418e9a6f035c6d567e5b80d28f9e82529d06acef49bc3670f8dd87c443dee

    SHA512

    ed0e679cc2307343b3e7bb2f35d7b3a318fa0719a2de887473d76765f5358b6fab1fff5ed5422df0101e8fe1fdbd71ed078b40f233726f684692e3cc5de8c6a1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    ff27970884bd76352b49ce48970d6a24

    SHA1

    4c3ba08aed4371787edab55b5946f6eec3e4fbe3

    SHA256

    d1bab3c96fee34378d6c5dd661ef85e07391f9c1ecc78f21ddf46f469ad6bec6

    SHA512

    948c3b08105137e59ba7d8033c0e759351f0eb53e1cd663e42c7d127e8fc0eb4c78a64c73feb905f4e5a5921a9f0e95fddcf315fc477218d378eeb28e145579a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    a460023bec39b227199e3378ae012745

    SHA1

    d1ab62c4e28e0ab748e28a98529d132a5f93d5e0

    SHA256

    4e9036f8e343d77a7e2b01c160dc9b44b3212d75808c7dd73c19c05aa23bb183

    SHA512

    6278d873ea8834ee8d2afbe694bf634f63dc925f4ba07d7966e6fa8e72ff5af5536b6ae23acde5ef286ba5e9cbc0e489f3515c4e494c0fd2a506924d1193cfde

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    f7e56a30af6e128b1a709885ff95e656

    SHA1

    0075c12028e44de8c93f946122f83e5216da17c9

    SHA256

    567c64799b45e80cfe54edbbd0c7f24351f7d1a5dae2339a340f7612cf41c1aa

    SHA512

    001e5233c9e50284284ff0c8219c57b31983a9d22a0d1901214d925529d47bf214aba7cb5b58a362e882289d6cd658ca035da0f8ed7ca5a12ffc524d9949b211

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    123d4458757c82dc981f8b8ff28ff982

    SHA1

    8f4df543546b72d81f739b6e16214789ede903db

    SHA256

    24e48f47bd4887c3cd413c696dbab3f943f0579beb3ae2956be5e3a38d83f5a3

    SHA512

    a843dfeb81496b3a8ded7fc4f02690bd4e32771767bec6f7a4de56f295defc06ecaa6dbd6a57f53577beeaae994ea0794210f5d1326eb805d3f29bda8c26a11d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d595a5f88b787614a73c5a402bc731c9

    SHA1

    471b2c53ec7e2a5ef38cd90b96cd85b5d98b18ca

    SHA256

    c2b6a8ec0e70e8a004b550d0f64a4a28460fa214c11c0462d32393b1c855285d

    SHA512

    1afa414fab80515353310a07f118cbdea5c6e8e4952c8776a27e33110346e16ecd6c39d1b815355aa9533d1dedeb24af1080126d52ed9fbe2baa35527418f995

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    20cb80aef805eb1b64786f52501e6756

    SHA1

    8fee80f32b2163578532953b4be3dee58d3fa717

    SHA256

    57d8c8e50016b5b0bd6fd486c27cdb029c76cc9681c4e13f23d3988b058a2866

    SHA512

    3d6407ff58f6f9aca373c5275e7964e8fc12a81f03881d59b956946ef4304b2b3c50952fcf66a2eb3d32fc8c2701ededb649c023f465ab8a4e383a2a4f5ed92f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    833e7378a63fff210467ab349fb00341

    SHA1

    7fcd95e55720383fc0be61c58a33385f99f7febb

    SHA256

    87e3e47f3bd3111cb72f108cfabfa80f69feddcdbf09c26929c7f8181e2684e0

    SHA512

    7a7d5066c3abd7dca4513743e17058a62ff3541cf75ea9146748b5a00d788cdc2af6a659bdebecbf5c279e1ba50c8c729c83aa25cdcaf130fbab0df7cf50e581

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    23870486e9deff3578fcc82b72553d65

    SHA1

    50de387a2a99195289ab6e2b6cb8fd3fb96d07ef

    SHA256

    d55e0285129b2805acb068ed470bf27969d4296037569b0716ea018b0e4f25fe

    SHA512

    5f4d2f82e4734f312c98a662ef1b89c45556836a513adb1949d44e04781a4e4de74da4bd67bd5163360d9946e45767c361873d059c69e1fabc36e58247cd4380

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    55aa45965f330fc3564f8b91ce55d4ef

    SHA1

    b61bf46cb5c36ea7dfb39ef463a3c99b359c19fe

    SHA256

    0a6cfd9fb9601b78083855c18d0900f5b8ebfcfcfec4a416d9e87410c8e5811e

    SHA512

    569e530b652d340b725725295b583597b7a9856e4d5822c26665d83117a4eefbd5cda4baaf3bec8873b6b30e5fadb9ae139120730922094cc891e26428fe62fe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    d0e753176b19d1be1208e9c2fee90558

    SHA1

    ac6d4b4f42fceb8bf8c96dc114f1b6e8af453512

    SHA256

    5accf05f6db4af894fb30234d21252d2b2a81a78062b93fe0c0c353af72d9a8f

    SHA512

    dc135e52bc374c277ba8fded21ed7a968a8a90c5193f526c8627ec5cf8e81336821d504c7ec307bf91f6c92b5870c69a3eb983eda58d4efb032a2f0554238b17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    46eb2b2746414befe6bb40e0d5d7c7c0

    SHA1

    e224dc9f8d2da8c261ccf614a691dc7a8722388e

    SHA256

    f3d6071a91d60de8ec0fcbf65fe6b51d31b1a8c494ceebcb842155dc45e1788d

    SHA512

    13d9c270c386cd55850789b63b5868d7fa185e1937b72caf0eed3276a8723c95b69275db6842ce787b6e3c7c8c6c11910894dc12fa1c8bc552c8ee48acea4017

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    771f1bfec2d8a00d43f8e2ec2c28443b

    SHA1

    50389ff3b9651a91197bcaaafc2ce02b354ce1ab

    SHA256

    c6a026a2a70658e8a4ca364eb86f53d1cde888744758aeda1c2cd056b5b80408

    SHA512

    3c325327990a79160f3f5710488ec04c87d170c76b0e9416044974a2cc36cf8077e9fa9f074445cc5e2cc4c8671cbc8d7bbeae3e5622fe0cf9bcc937f6e0af21

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    db94490ef75f4905aef927cab5ebd80c

    SHA1

    d4e7a13a2bc3ecb190a0e49356ad52403c6ddfb4

    SHA256

    da1c7b6e0a3adf4fed501aa2202d05e5afd1b76e464b62260b488f5f51a7fd7e

    SHA512

    e7f2aea1b15dfd82702ca5da86ffa6f28e6ef94893e1dab26c9dc54a83d9e5e8078b48b157c5cd54c919d71fd556de566e1d2e443e8f8b6795b6ada786770eae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    7b4d217bb5419e04180121a616b4090b

    SHA1

    2ab637e7f82adaf84d6e83a1a242087623609ab9

    SHA256

    c2cab5bb7ae143aad7097c37447a03d6ff1a9de6adb7219b684cf3dcb47c7323

    SHA512

    f306de588af78eaa93009c8a0220fec144eaf540cae3422f73e22b1f5a63e571adb4944cc6c7df6d13a485487b3b75c51aa1a7a3a0c8aea55c9d2fe0f512c55f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    c7bf7b8d4d7156d39125981f63ccfaf6

    SHA1

    a6e55bb5736e5b1963bd3c9ccdec859146c56975

    SHA256

    6cf943327406294500a65a60ea148aee8b1d56759d87b606135653590c1674eb

    SHA512

    2f4a4944ce1b12a04ebba4a8b42ffd980c0cf2376673aa4d95d7f9a4b02f73d2bc98a78a285884fae5ed51a95e69f347324899c3b5208cd53fd6f6c6280742c9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    b945ed69e988b57b48e0274976bdfd8a

    SHA1

    ec4c10a3d0c65e9ca79941c3ab3c56c0d6a7f367

    SHA256

    cf8f3d178ff426d1f568fb4d594403d76160476a177a5e330de03f4146e923e1

    SHA512

    f848bd51a5d33493676b5cb3463c3b7461027c5c3bc8f4593c4648cbd1168a5e860af94059b92ef7b131fb967e055de2dc94b49873b7445fcca3fbbaa4d9a5ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    1363f29f0b7878b9f607b124216d72f0

    SHA1

    134d6a6dda935700cae0479d81e8a920321da4fe

    SHA256

    65ec58c5e5084fd784c6695e679e72cc983e084d0bf79183964b2a4f1ee1a136

    SHA512

    22a1e6995f16327910416c87cb5d99a97c02b02f0260cd39c1dd54ffc43d9fc9e7e46e0c2e6ca41c206a7ef41b42536a14264b1c1dab6f358bc9036321436a99

  • C:\Users\Admin\AppData\Local\Temp\Cab429F.tmp
    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar447A.tmp
    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a